People know password reuse is risky but keep doing it anyway
35% of Gen Z said they never or rarely update passwords after a data breach affecting one of their accounts, according to Bitwarden. Only 10%…
35% of Gen Z said they never or rarely update passwords after a data breach affecting one of their accounts, according to Bitwarden. Only 10%…
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding a newly discovered and actively exploited vulnerability in the widely used Apache…
Threat actors are increasingly harnessing automation, commoditized tools, and AI to systematically erode the traditional advantages held by defenders, according to Fortinet. “Our latest Global…
In today’s digital era, Chief Information Security Officers (CISOs) are under immense pressure to protect their organizations from increasingly sophisticated cyber threats. The threat landscape…
Phone theft is a rising issue worldwide, and it’s more than just a property crime. It’s a serious cybersecurity threat. In the UK alone, the…
In today’s hyperconnected business environment, building a resilient cyber defense is crucial. Cyber threats have evolved into persistent and sophisticated challenges that jeopardize organizational stability.…
Third-party risk management (TPRM) is compromised in many organizations because those holding the relationship with the third-party (relationship owners) don’t escalate red flags to compliance…
As organizations increasingly adopt hybrid work models, Chief Information Security Officers (CISOs) face new and complex challenges. The traditional boundaries of enterprise security have dissolved,…
Here’s a look at the most interesting products from the past month, featuring releases from: 1touch.io, Abnormal AI, AppViewX, Arctic Wolf Networks, Bitdefender, BitSight, Bugcrowd,…
In today’s rapidly evolving cyber threat landscape, organizations are increasingly challenged by the sophistication and frequency of attacks targeting their digital assets. Traditional security tools,…
CyberArk has released its 2025 Identity Security Landscape, a global study revealing how organisations are inadvertently creating a new identity-centric attack surface through the growing…
The initial public draft of NIST Special Publication (SP) 800-234, High-Performance Computing Security Overlay, is now available for public comment. High-performance computing systems provide fundamental…